Malware

Application.Fragtor.31453 malicious file

Malware Removal

The Application.Fragtor.31453 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Application.Fragtor.31453 virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • A process attempted to delay the analysis task.
  • Dynamic (imported) function loading detected
  • Performs HTTP requests potentially not found in PCAP.
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Attempts to modify proxy settings

How to determine Application.Fragtor.31453?


File Info:

name: EF1492917EABCF3C8892.mlw
path: /opt/CAPEv2/storage/binaries/4cf83ce1921f3fcf0d42943e40b9f22c6fd56d759d451bb41e812cfa18dbd399
crc32: 592F4F7A
md5: ef1492917eabcf3c889274fe2cadf32d
sha1: 7c0c3e9fb88d78d72be8b7c373a2327582bcdf2b
sha256: 4cf83ce1921f3fcf0d42943e40b9f22c6fd56d759d451bb41e812cfa18dbd399
sha512: f8e5433804e1452e453360105a4b3036a92562afa4c2ba4cd1837e0dc6fe3791aa79ebf8beeac9c3b2f2d84b242f0eada7534f4a4a2d561b0010777bd77f1cb2
ssdeep: 24576:DZ/DBo+19Z3oOtvUODo2IDAby0kxLrrW:DZ/L9toYWkCLe
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1941501E397154628D91BB0B58C4BAF0A1B0376A7903293DF02AA492F69CFF174C5B573
sha3_384: d87f46a9e6daced6ade592a85d0e9b9a2efa5f84ddd76cc29d96b945657752e17e88585060f79f99455915239defda3f
ep_bytes: 60be009053008dbe0080ecff5789e58d
timestamp: 2022-02-06 13:25:06

Version Info:

FileVersion: 1.3.0.6
FileDescription: 检验结果快速输入
ProductName: 检验结果快输
ProductVersion: 1.3.0.6
CompanyName: 麒灵工作室 By:U_Ghost
LegalCopyright: 版权为麒灵工作室所有 http://www.qlsoft.site/
Comments: 检验结果快速输入
Translation: 0x0804 0x04b0

Application.Fragtor.31453 also known as:

Elasticmalicious (high confidence)
CynetMalicious (score: 100)
FireEyeGeneric.mg.ef1492917eabcf3c
CAT-QuickHealRansom.Gimemo.16898
CylanceUnsafe
K7GWTrojan ( 005246d51 )
K7AntiVirusTrojan ( 005246d51 )
ArcabitTrojan.Application.Fragtor.D7ADD
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Packed.FlyStudio.AA potentially unwanted
APEXMalicious
BitDefenderGen:Variant.Application.Fragtor.31453
MicroWorld-eScanGen:Variant.Application.Fragtor.31453
Ad-AwareGen:Variant.Application.Fragtor.31453
EmsisoftGen:Variant.Application.Fragtor.31453 (B)
ComodoPacked.Win32.MUPX.Gen@24tbus
McAfee-GW-EditionBehavesLike.Win32.Trojan.cc
SophosGeneric ML PUA (PUA)
JiangminTrojan/Genome.cbal
Antiy-AVLTrojan/Win32.FlyStudio.a
MicrosoftTrojan:Win32/Wacatac.B!ml
GDataWin32.Trojan.PSE.5LSHNI
AhnLab-V3Malware/Win.Generic.C4448686
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.34182.2mKfamjOQreb
ALYacGen:Variant.Application.Fragtor.31453
MAXmalware (ai score=71)
VBA32BScope.Trojan.Orsam
MalwarebytesMalware.AI.4203382770
RisingMalware.Heuristic!ET#94% (RDMK:cmRtazoUJxMJosOmEWLpJZE3tj4x)
SentinelOneStatic AI – Malicious PE
FortinetW32/CoinMiner.65CA!tr
Cybereasonmalicious.17eabc
MaxSecureTrojan.Malware.300983.susgen

How to remove Application.Fragtor.31453?

Application.Fragtor.31453 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment